Impact
A heap based buffer overflow exists in Fortinet FortiAnalyzer Cloud and FortiManager Cloud versions 7.6.2 through 7.6.4. If an attacker sends a specially crafted request, they can trigger the overflow and achieve remote code execution or arbitrary command execution without authentication. The weakness, classified as CWE-122, undermines confidentiality and integrity, empowering an attacker to compromise the affected system fully.
Affected Systems
Systems running Fortinet FortiAnalyzer Cloud from version 7.6.2 up to 7.6.4 and FortiManager Cloud from version 7.6.2 to 7.6.4 are impacted. Updating to version 7.6.5 or later, or to the forthcoming 8.0.0 series, resolves the issue and restores secure operation.
Risk and Exploitability
The CVSS base score of 7.3 indicates a high severity and highlights the remote and unauthenticated nature of the exploit. Although the exploit would require significant preparation work, such as bypassing address‑space layout randomization and navigating network segmentation, the potential impact is severe. The vulnerability is not listed in CISA’s KEV catalog, and EPSS data is unavailable, so current exploitation prevalence is unclear, but the high severity warrants immediate mitigation through the recommended upgrade.
OpenCVE Enrichment